期刊文献+

一种基于傅立叶变换的异常入侵检测方法

An Anomaly Intrusion Detection Method Based on Fourier Transform
下载PDF
导出
摘要 利用傅立叶变换对一组从审计记录中获得的离散数据进行处理,介绍了选择傅立叶变换的系数的准则,它用来从一组系数中寻找出一个统一的标准值;并用这个值与一个门槛值相比较,以决定是否有异常情况发生,同时给出了一些测试结果。 A set of discrete points obtained from audit, records on a behavior session are processed with Fourier transform. The criterion of selecting Fourier transform coefficients is introduced, and is used to find a unified value from the set of coefficients. This unified value is compared with a threshold to determine whether the session is abnormal. Finally test results are reported.
作者 张家明
出处 《武汉理工大学学报(信息与管理工程版)》 CAS 2005年第5期102-103,131,共3页 Journal of Wuhan University of Technology:Information & Management Engineering
关键词 入侵检测 异常入侵检测 傅立叶变换 intrusion detection anomaly intrusion detection Fourier transform
  • 引文网络
  • 相关文献

参考文献1

二级参考文献9

  • 1Mukherjee Biswanath,Heberlein L T,Levitt K N. Network intrusion detection[J].IEEE Network, 1994,8 (5-6) : 26-41.
  • 2Wei Fan ,Lee Wenke ,Stolfo Sal ,et al.A Multiple Model Cost-Sensitive Approach for Intrusion Detection[A].11th European Conference on Machine Leaming(ECML'00),Barcelona,Spain:2000.
  • 3Richard Stevens W. TCP/IP Illustrated[M]. Boston,MA,USA:Addison Wesley, 1995.
  • 4Irwin Vicki. Cisco Technical Report[R]. San Jose,CA,USA:Cisco System,Inc, 1999.
  • 5Irwin Vicki,Pomeranz Hal. Advanced Intrusion Detection and Packet Fihering[R].San Jose CA,USA:Cisco System Inc, 1999.
  • 6Simon Garfinckel,Gene Spafford. Practical UNIX and Internet Security [M].Sebastopol,CA,USA:O'Reilly & Associates Inc,1996.
  • 7Comer Douglas E.Internetworking with TCP/IP[M].Upper Saddle River,NJ,USA:Prentice Hall, 1995.
  • 8Anonymous. Maximum Security[M]. Indianapolis, IN,USA :Sams Publishing, 2002.
  • 9Cheswick William R,Bellovin Steven M. Firewalls and Internet Security:Repelling the Wily Hacker[M].Boston,MA,USA:Addison Wesley, 1994.
;
使用帮助 返回顶部